Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Victor Chang (Data Scientist,Industry 5...Professor of Business Analytics, Aston UniversityVerified email at aston.ac.uk
- Ben S. LiuProfessor Emeritus of Marketing, Quinnipiac UniversityVerified email at quinnipiac.edu
- Lewis GolightlyLecturer in Cybersecurity and Blockchain at Teesside UniversityVerified email at tees.ac.uk
- Karl HallLecturer in Computing & Games, Teesside UniversityVerified email at tees.ac.uk
- Chang XiongXi'an Jiaotong-Liverpool UniversityVerified email at xjtlu.edu.cn
- Ching-Hsien Hsu; Ching-Hsien (Rober...School of Mathematics and Big Data, Foshan University, China;Verified email at fosu.edu.cn
- Le Minh Thao DoanTeesside UniversityVerified email at tees.ac.uk
- Jie LiSenior Lecturer in Cybersecurity and Networks, Teesside UniversityVerified email at tees.ac.uk
- Victor Mendez MuñozDirector of Software Engineering (IUL) / Cosultant Professor (UOC)Verified email at uoc.edu
- Prof. Dr. Harleen KAURFull Professor, Fr Research Fellow United Nations (Tokyo), TWAS Visiting Professor,Fellow(IETE)Verified email at jamiahamdard.ac.in